HUB International. Security Risk Management Services
|
|
- Magdalen Holland
- 6 years ago
- Views:
Transcription
1 HUB International Security Risk Management Services Prepared by: Hart S. Brown, CORP, CBCP, LPQ Vice President, Practice Leader Organizational Resilience HUB International Risk Services
2 Table of Contents Executive Summary.. 3 HUB International. 4 Risk Services 5 Security Risk Management Services 6 Client Commitment 12 HUB Biographies 13 Legal Notice All consulting services performed by HUB are advisory in nature. All resultant report is based upon conditions and practices observed by HUB and information supplied by the client. Any such reports may not identify or contemplate all unsafe conditions and practices; others may exist. HUB does not imply, guarantee or warrant the safety of any of the client s properties or operations or that the client or any such properties or operations are in compliance with all federal, state or local laws, codes, statutes, ordinances, standards or recommendations. The advice and recommendations submitted in this plan constitute neither a warranty of future results nor an assurance against risk. All decisions in connection with the implementation, if any, of any of HUB s advice or recommendations shall be the sole responsibility of, and made by, the client. Page 2
3 Executive Summary HUB International offers security risk management services to selected clients and family offices. As an introduction to these services, we are pleased to present the details of the security risk management capabilities in the pages that follow. The information will serve to familiarize your team with the types of assistance that we believe will be of value to you and your clients. The services can be developed and delivered as a package or individualized and tailored to meet specific and individual requests as each service type is designed to be flexible and adaptable to the needs of the client. All services will be proposed at an agreed-to cost structure and billed at completion. Additional information can be found: HUB Crisis Management Website - HUB Cyber Risk Website - HUB Personal Insurance Website - HUB Family Office Website Page 3
4 HUB International Headquartered in Chicago, IL, HUB International Limited is a leading global insurance brokerage that provides a broad array of property and casualty, life and health, employee benefits, investment and risk management products and services from offices located throughout North America. HUB International has more than 8,800 employees in more than 350 offices. Since 1998, HUB has focused on developing innovative risk management solutions for leading family office organizations ad high net worth clients. By combining our broad range of products with expert advice, our clients are assured we will deliver a complete risk solution with the level of service they deserve. Accomplished risk services consultants with an average of more than 20 years experience. Security expertise in more than 50 countries worldwide. Geographic reach in offering clients regional expertise and solutions throughout North America and internationally. High net worth specialty practices that offer expertise in risk solutions for aircraft, watercraft, equine, farms and ranches. Fine art and collectibles team specializing in cultural institutions, galleries and significant individual collections. Flexible service platform that meets the specific risk management needs of each high net worth individual or family. Strategic Locations HUB International is structured around large regional hubs with satellite offices strategically located throughout North America. Our geographic footprint includes more than 350 offices. The diversified and localized presence provides a significant competitive advantage. Personal service, individual attention and the ability to respond quickly to client needs. We are able to provide local representation to high net worth individuals and families almost anywhere within North America. Internationally, we can support clients directly or through partner service providers. Page 4
5 Risk Services The HUB Risk Services is based out of our headquarters in Chicago, Illinois and offers tailored solutions to clients with consultants located strategically North America. Our team of nearly 100 risk consultants has the proven knowledge and experience to assist in identifying current/potential risks and implementing controls to reduce exposure to loss, as well as partnering with our clients to create claims management processes and address claim issues should they occur. This experience and geographic reach creates a large number of core services, but still allows our local team members to be responsive to individual needs, providing custom solutions to address specific risks. Based on the needs of our clients, our risk team can provide services around the globe directly or through local partnerships. HUB maintains a flexible approach to connect our clients with the specific HUB Risk Services team member that can best fulfill your goals and objectives. Our team members include: Security professionals Crisis management professionals Cyber risk management professionals Board-certified safety professionals Certified risk managers Certified construction risk specialists Environmental risk managers Property protection specialists Former corporate directors General liability experts Emergency response professionals Fire protection / professional engineers HUB International specializes in a wide variety of risk services products and consultancy. Because we serve both commercial and private clients, we can offer solutions that are properly scaled to meet your specific needs. High Net Worth/Family office risk management Security risk management Crisis management Property risk engineering Safety & environmental management Transportation risk management Construction safety management Industrial Hygiene Travel risk management Cyber risk management Enterprise risk management Business continuity management Emergency management Entertainment risk management Environmental management Claims management Page 5
6 HUB Security Risk Management HUB Security Risk Management Services 24/7/365 Access to Security and Crisis Advisory Services Subscribing members have access to security advisory services on a 24/7/365 basis applicable anywhere in the world. The basic service includes two assistance calls per year. Assistance thereafter is at a cost of $60 per call. These advisory services include: Threat assessments Preventive security recommendations Security response processes and procedures Coordination with local security or crisis response services Coordination with insurance carrier provided crisis services Specialized Identity Theft Protection Identity theft protection guides, monitors, protects, and restores client identities. Specific services include cyber concierge services, consulting services, proactive third-party inquiries, breach response and remediation as well as focused monitoring and resolution services. Background Checks (US and Canada) The background check service is provided to clients to review both the professional and personal history of a new or existing employee. The investigation includes criminal history, credit history and employment history in order to reduce risk and assess suitability. Cyber Activity Risk Assessment The cyber risk activity assessment reviews how data is accessed and shared in order to determine the potential exposure of private information. The results can be reviewed to establish an overall risk exposure. The assessment includes: Physical protection of devices File storage Online activity Mobile device procedures protection Social media usage Travel Page 6
7 International Background Checks International background checks can be an important part of a thorough, comprehensive background check. It is recommended that international criminal checks be conducted when considering applicants from abroad or applicants who have recently come from overseas. In addition, international background checks should be considered for U.S. citizens who have worked or been educated abroad and foreign nationals for a position in their home country. Employee Personality/Suitability Assessments The employee personality or suitability assessment ensures an appropriate match for a potential position. It is comprised of a series of questions that are administered online and in multiple languages to determine an individual s personality and behavioral style. The profile is electronically scored creating a profile report assessing honesty and integrity, as well as the propensity to steal, use drugs, lie, exhibit hostility, or have an entitlement mentality. Investigative Services HUB is able to coordinate investigations and due diligence services virtually anywhere in the world, through its networks of partnerships in more than 200 cities worldwide. Investigations can include potential business partners, customers, suppliers, licensees/agents, distributors, potential joint-venture partners, subsidiaries or merger and acquisition candidates. HUB can facilitate local resources to limit potential risk and establish due diligence in decision-making processes. Online Reputation Assessment Reputation can be considered an asset and the protection of a person s online presence and reputation may be considered for personal preferences, security reasons, financial reasons or due to professional requirements. A scan to determine the types of information that are easily identifiable and attributable will be conducted on open records, news outlets, professional publications, blogs and social media platforms. The results will be reviewed and various security and reputational management options and recommendation will be proposed for consideration. Page 7
8 Cyber Security Assessment The cyber security assessment combines a cyber-health check with an independent, objective review of your personal and organization s security and privacy practices. A remote scan of your perimeter network devices such as firewalls, web servers, servers, etc. will be conducted to mitigate vulnerabilities and stave off potential attacks. Property Security Assessment The property security assessment is comprised of two parts, a threat assessment and a vulnerability assessment. The threat assessment is conducted to assess the potential of specific security related incidents. The vulnerability assessment is a systematic evaluation to detect security gaps in the current physical security system. This includes crime prevention through environmental design (CPTED) factors. It is used to determine the effectiveness of countermeasures in protecting specific property types from specific aggressors. This service is applicable for a residence, watercraft, aircraft and assets such as jewelry, art, antiques, guns or other valuable possessions and includes a review of: Historical security events Crime trends Risk factors Qualitative threat assessment Day and night evaluations Intrusion detection Alarm assessment CCTV systems Entry control Delay mechanisms Personal Security Awareness Training Personal security awareness training provides individuals with the foundation on gaining knowledge of crime as a process, improving situational awareness of surroundings, providing effective crime avoidance strategies and reinforcing the importance of obeying intuition. Developing and strengthening security awareness techniques can help ensure individuals have an understanding of family expectations, as well as company security procedures and best practices. This includes: Indicators of crime Recognizing surveillance Recognizing indicators of violence Conflict de-escalation Driving security Safety in elevators, parking lots, walking areas Hotel selection and travel safety Immediate response actions to take Assistance with Coordinating Security Services Assisting and coordinating security services includes supporting alarm systems, security drivers, executive protection personnel and crisis response services. HUB experts can recommend security organizations that have met standardized security operating standards and can assist in defining actions to be taken to increase security arrangements if the threat or their exposure changes. These services can be coordinated for special events, while traveling or as a per client request basis. Page 8
9 Threat of Violence Consultation Security consultation can give direction and support before, during, and after threatening situations and include the use of behavioral health professional, as needed. Threat of violence consultation is designed to create an organized and sequential approach to threat management. Immediate response Threat assessment Defusing actions Travel Briefs The HUB travel brief provides guidelines to minimize risks, costs and the impact of a potential incident while traveling. This brief is specific to a location and provides insight on security, natural hazards and medical risks. This includes: Destination or location overview Tailored risk assessments Latest crime information Advice on how to avoid becoming a victim Natural hazards (earthquakes, floods, storms, etc.) Local health concerns (vaccinations, things to avoid) Recommended hospital in the area Emergency contacts Protective Intelligence Updates Protective intelligence services are offered as a way to maintain up-to-date information on specific incidents impacting individuals worldwide. These intelligence updates can be distributed electronically to clients using the best information and analysis available in order to deliver appropriate advice and recommendations. The updates are designed to provide timely, actionable products that assist in mitigating safety and security risks. In addition, clients can make requests and inquiries regarding specific incidents or locations. Kidnap, Ransom/Extortion Response Services Kidnap/extortion response services provide advice on creating preparatory response plans, as well as advocating for the client as part of a crisis response. Response plans focus on immediate actions and response procedures that can be applied to any individual that may encounter this type of situation worldwide. The plan includes the following: Response priorities Incident assessments and escalation steps Domestic and international incidents evaluation Communications with authorities Response team appointments Communicator responsibilities Working with an advisor guidance Information and physical security assessment Kidnap stages and preparations Financial aspects of a kidnap Page 9
10 Evacuation Planning and Response Coordination Evacuation from a security or medical crisis can become difficult to manage. The evacuation support services provide coordination for the emergency evacuation of clients, dependents and other travelers in situations where it is no longer safe to remain in the location. The services include guidance to conduct of an evacuation, and operations and implementation procedures including: Incident coordination Indicators, triggers, security levels Evacuation preparation and warning Decision to evacuate process Conduct of the evacuation Evacuation procedure checklists Property Risk Assessment HUB Property Risk Consultants partner with our clients to understand their goals, objectives and challenges, as well as develop/implement property risk solutions that identify and minimize risk. The property risk assessment is designed to assess hazardous events and guidance on how to mitigate damage. This can include new residences, renovation/construction at a current residence and other larger assets. Property audits and reviews Natural hazard assessments Fire evaluation Property replacement costs calculations Property construction assessment Staff and employee training Emergency response planning Environmental compliance review Disaster Planning and Response Coordination Thoughtful preparation and planning pre-disaster can make a difference in mitigating potential negative consequences. HUB can assist in developing a response plan, as well as coordinating necessary support during a response. A disaster plan can be developed through the evaluation of hazards that are inherent near the location and addresses how to manage a potential incident. The plan should facilitate actions through pre-determined guidelines during and after the incident. The plans can include: Contacting emergency services Description of potential hazards Emergency evacuation or shelter in-place Accountability and communication Fire response procedures Severe weather response procedures Bomb threat response procedures Medical and rescue coordination Page 10
11 Electronic Countermeasures Assessment As there can be concerns related to the confidentiality of high level conversations, HUB can facilitate an electronic countermeasures assessment or sweep to minimize the potential for listening devices and electronic surveillance. The assessments and equipment that can be used are designed to detect, disrupt and/or defeat sophisticated electronic information gathering measures. These assessments can be done on a regular basis, based upon a change in the security environment or upon request. Lifestyle Assessment The lifestyle assessment is designed to identify potential risks presented to the client and evaluate mitigation strategies. Through discussions or a questionnaire, the discovery process is intended to capture as much information about the status, existing functionality and desired direction regarding a client s security risk management approach. Key deliverables for the lifestyle assessment reports include: Security profile Travel profile Activity profile Crisis Counseling Crisis counseling is available for those faced with a traumatic event or other situation where there is a need for psychological crisis support. Services normally begin with a short phone call between the counselor and a representative of the family and then potentially an on-site visit. Once engaged, individuals can call 24/7/365 and speak to a trained counselor on a completely anonymous and secure line. Counseling can be conducted: One-to-One Small groups Families Page 11
12 Client Commitment The HUB Advantage Our global resources and local relationships create world-class results for clients. With offices across North America, we are uniquely positioned to tailor solutions to meet local needs. Doing business with HUB means you can be assured that we will deliver constant innovation, integrity, and partnership. This discipline keeps us focused on providing advanced risk management services to all of our clients. HUB is the premiere resource for protecting and preserving personal, family and estate assets. As a trusted advisor, HUB is committed to help you manage risk and achieve your professional and personal goals. Our risk services division offers highly trained, experienced professionals who provide expert guidance and customized risk management solutions. HUB International s service philosophy is the driving force behind our culture. It is a business philosophy that says, Our Client Always Comes First. It means client-centric services, upholding the highest standards of ethical conduct, integrity, expertise, communication and responsiveness. Page 12
13 Biographies HART S. BROWN, CORP, CBCP, LPQ Senior Vice President - Organizational Resilience, Risk Services Division Hart Brown brings 20 years of experience in security, crisis management, emergency management, and business continuity to HUB International, currently serving as the Vice President and Practice Leader of Organizational Resilience in the Risk Services Division. Hart is an internationally recognized thought leader and has worked for several of the US Government s top agencies as well as leading private companies. He has served as a consultant, media contributor, conference presenter and author on crisis management issues. Prior to HUB, Mr. Brown was responsible for the security & crisis management for a multi-national retailer. His responsibilities included establishing market risk profiles, protective intelligence, executive protection, travel risk management and supply chain security for the company s global expansion. He conducted training & exercises, and managed crisis, business continuity, security events for the organization. As the crisis team leader, he designed the corporate critical incident management program and created specialized response plans for incidents of workplace violence and kidnapping and extortion. Formerly, Hart worked with the US Department of State, Diplomatic Security Service, Anti-Terrorism Assistance Program where he assisted partner countries in enhancing national level services related to critical incident management, vital infrastructure security, diplomatic protection, interdicting terrorist activity, response to hazardous materials incidents and hospital based management for mass casualty events. This includes supporting major global events such as the World Cup in South Africa and the APEC conference in Peru. In previous roles, Hart was instrumental in developing various crisis and security management plans for large corporations, universities and non-governmental organizations as a senior consultant for International SOS. In 2002, he provided leadership in security management, threat assessments and executive protection with WorldCom during one of the largest bankruptcies in US history. In 1998 using statistical methods he developed to evaluate the potential for targeted violence, Hart created the foundation for the US National Threat and Risk Assessment Program under the US Department of Justice. Hart was a co- author of the 2014 ANSI/ASIS SPC.2 standard on Auditing Management Systems for Risk, Resilience, Security and Continuity Management. He has received an Award of Appreciation from President George W. Bush for providing security and crisis management services during a government transition in the Middle East, as well as awards of appreciation from 12 host countries for his role in safety and security management. He is well published on the topics of security, travel risk management, kidnap response planning, threat assessments, workplace violence, business continuity, and crisis management, and is a regular presenter at industry conferences. Hart is a Board Certified Organizational Resilience Professional, Business Continuity Professional and Loss Prevention. He is the Vice Chair of the ASIS International Crisis Management & Business Continuity Council and is a member of the Chief Security Officer (CSO) Roundtable where he sits on the Nominating & Governance committee. Other government and industry associations include the Domestic Security Advisory Council, Overseas Security Advisory Council, FBI Infragard, the DHS Fusion Center, the Loss Prevention Foundation and the Security Executives Roundtable. He is a graduate of Texas A&M University with a Bachelor of Science degree in Radiological Health Engineering (Nuclear Engineering/Medicine) and a Masters of Science in Safety Engineering. In addition, he is a graduate of the Federal Bureau of Investigation Domestic Security Executive Academy. Page 13
14 JOHN FARLEY, CIPP/US, AIC Vice President - Cyber Risk Management Services, Risk Services Division John Farley is currently serving as a Vice President and Cyber Risk Consulting Practice Leader for HUB International s Risk Services Division. Headquartered in Chicago, IL. John is based in New York City and brings 24 years of risk consulting experience to the firm. While working at HUB International John has performed a variety of cyber risk consulting services for clients across many industries, including but not limited to personal cyber risks, Healthcare, Retail, Financial Services, Higher Education and Information Technology companies. He serves as a resource for pre-breach planning and post-data breach response in network security & privacy liability consulting. In this role he applies extensive knowledge in data breach response best practices and works diligently with clients to achieve optimal results in cost mitigation. John acts as a central coordinator between all parties involved - the client, insurance carriers, and any outsourced service provider hired, including, IT forensics experts, privacy attorneys, public relations firms, call center operators and other breach response service providers. John also facilitates online access to HUB International's e-risk Hub. This online database serves clients ongoing educational needs in the ever-changing network security and privacy risk environment. In addition, John provides client training that assists clients efforts in forecasting potential loss costs related to a network security event. He is a regular speaker at educational seminars on multiple network security and privacy liability challenges facing organizations today. Areas of focus are HIPAA, Payment Card Industry Data Security Standards, FERPA, government threat sharing initiatives, regulatory compliance and data breach notice requirements at the state, federal and international levels. John has a Bachelors of Arts degree in English and a minor in Business Management from Manhattan College. In addition, John is a Certified Information Privacy Professional (CIPP/US) and has received his Associate in Claims (AIC) designation. Page 14
15 ROSS ALBERT, CAMS Assistant Vice President - Organizational Resilience, Security Risk Management Specialist, Risk Services Division Ross Albert has 10 years of experience in public and private intelligence, corporate investigations, international security and risk management and is currently serving as the AVP for the Organizational Resilience Practice with HUB International. Ross is an industry leader in establishing intelligence led risk management programs and developing public-private intelligence cooperation Prior to joining HUB, Ross was an Anti-Money Laundering Analyst for K2 Intelligence, where he advised financial institutions on all aspects of anti-money laundering investigations, OFAC sanctions and regulatory compliance. As part his work with large multi-national banks, he was instrumental in a number of significant investigations including the FIFA corruption scandal. Through the development of analytical processes, programs, policies and plans he supported these financial institutions in identifying and reporting suspicious activity. Prior to joining K2, Ross was an International Security Intelligence Analyst for Rent-A-Center, Inc. based in Dallas. As their lead intelligence analyst, he served a key role protecting personnel and assets in over 200 locations in Mexico. Ross was responsible for threat and risk assessments on various markets in Mexico and Latin America, which were used to determine the strategic direction and support the corporate expansion in the region. In addition, Ross created and designed unique methods for the use of social media analytics as a real-time, early warning mechanism as part of an intelligence led security risk management program. He was a member of the corporate crisis team where he managed multiple critical incidents. He also worked closely with government agencies such as the US Department of State, the Department of Homeland Security and US Treasury Department s Office of Foreign Assets Control (OFAC). Previously, Ross held positions with the New Jersey Transit Police Intelligence Section and the New Jersey Office of Homeland Security and Preparedness where he provided investigative case support for law enforcement personnel, conducted open source research on terrorism intelligence issues and prepared daily intelligence briefs. He also previously worked at Morgan Stanley in their Private Wealth Management division, assisting in developing investment and financial analysis for high-net worth clients. Ross has published work on transnational crime in Latin America and terrorist financing. He is a Certified Anti- Money Laundering Specialist (CAMS) and is a member of the Overseas Security Advisory Council, DHS Fusion Center, Association of Certified Anti-Money Laundering Specialists and the New York Analysts Roundtable. He earned an M.A. in International Relations from Seton Hall University, specializing in Security Studies and Latin America. He holds a Professional Certificate in Global Affairs from New York University, and earned a B.A. in Political Science from the University of Michigan. Page 15
COUNTERING IMPROVISED EXPLOSIVE DEVICES
COUNTERING IMPROVISED EXPLOSIVE DEVICES FEBRUARY 26, 2013 COUNTERING IMPROVISED EXPLOSIVE DEVICES Strengthening U.S. Policy Improvised explosive devices (IEDs) remain one of the most accessible weapons
More informationPeople Assets Reputation
Welcome to Spearpoint International LLC The risks faced by global business are greater now than ever, the increasing danger from terrorism and the ever present threat from organized and opportunistic crime
More informationBest Practices for Campus Security. January 26, 2017
Best Practices for Campus Security January 26, 2017 Welcome to Safe University (Safe U ) Protecting People, Property, and Tradition: The Safe University (Safe U SM ) Program By G. Michael Verden, Owner
More informationInstitute of Internal Auditors 2019 CONNECT WITH THE IIA CHICAGO #IIACHI
Institute of Internal Auditors 2019 CONNECT WITH THE IIA CHICAGO CHAPTER: @IIACHI #IIACHI WWW.FACEBOOK.COM/IIACHICAGO HTTPS://WWW.LINKEDIN.COM/GROUPS/1123977 1 CAE Communications and Common Audit Committee
More informationSecurity and Privacy Governance Program Guidelines
Security and Privacy Governance Program Guidelines Effective Security and Privacy Programs start with attention to Governance. Governance refers to the roles and responsibilities that are established by
More informationDepartment of Management Services REQUEST FOR INFORMATION
RESPONSE TO Department of Management Services REQUEST FOR INFORMATION Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring, and Restoration Services September 3, 2015 250 South President
More informationIT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18
Pierce County Classification Description IT SECURITY OFFICER Department: Information Technology Job Class #: 634900 Pay Range: Professional 18 FLSA: Exempt Represented: No Classification descriptions are
More informationCyber Risks in the Boardroom Conference
Cyber Risks in the Boardroom Conference Managing Business, Legal and Reputational Risks Perspectives for Directors and Executive Officers Preparing Your Company to Identify, Mitigate and Respond to Risks
More informationMax Security Solutions
Max Security Solutions Max Security Solutions Proactive Risk Management What we do Max Security provides comprehensive security and risk management solutions for the business sector, private clients and
More informationTIPS FOR FORGING A BETTER WORKING RELATIONSHIP BETWEEN COUNSEL AND IT TO IMPROVE CYBER-RESPONSE
TIPS FOR FORGING A BETTER WORKING RELATIONSHIP BETWEEN COUNSEL AND IT TO IMPROVE CYBER-RESPONSE Association of Corporate Counsel NYC Chapter 11/1 NYC BDO USA, LLP, a Delaware limited liability partnership,
More informationCOUNTERING IMPROVISED EXPLOSIVE DEVICES
COUNTERING IMPROVISED EXPLOSIVE DEVICES FEBRUARY 26, 2013 Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information is estimated to average 1 hour
More informationApplication for Certification
Application for Certification Requirements to Become a Certified Information Security Manager To become a Certified Information Security Manager (CISM), an applicant must: 1. Score a passing grade on the
More informationBUSINESS CONTINUITY MANAGEMENT PROGRAM OVERVIEW
BUSINESS CONTINUITY MANAGEMENT PROGRAM OVERVIEW EXECUTIVE SUMMARY CenturyLink is committed to ensuring business resiliency and survivability during an incident or business disruption. Our Corporate Business
More informationCybersecurity Overview
Cybersecurity Overview DLA Energy Worldwide Energy Conference April 12, 2017 1 Enterprise Risk Management Risk Based: o Use of a risk-based approach for cyber threats with a focus on critical systems where
More informationPROVIDING INVESTIGATIVE SOLUTIONS
PROVIDING INVESTIGATIVE SOLUTIONS Experienced Professionals Northeast Intelligence Group, Inc. (NEIG) has been helping clients meet challenges for more than twenty years. By providing meaningful and timely
More informationSecurity Program Design:
Security Program Design: A Critical Infrastructure Protection Model Experience, Dedication, and Leadership July 17-18, 2013 Toronto, Ontario CAN in Security EDUCATION Earn up to 16 CPEs Are you confident
More informationDepartment of Homeland Security Updates
American Association of State Highway and Transportation Officials Special Committee on Transportation Security and Emergency Management 2016 Critical Infrastructure Committee Joint Annual Meeting Department
More informationlocuz.com SOC Services
locuz.com SOC Services 1 Locuz IT Security Lifecycle services combine people, processes and technologies to provide secure access to business applications, over any network and from any device. Our security
More informationForensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services
Forensic Technology & Discovery Services Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services Forensic Technology & Discovery Services EY s Forensic
More informationGlobal Security Consulting Services, compliancy and risk asessment services
Global Security Consulting Services, compliancy and risk asessment services Introduced by Nadine Dereza Presented by Suheil Shahryar Director of Global Security Consulting Today s Business Environment
More informationInvestigating Insider Threats
Investigating Insider Threats February 9, 2016 Jonathan Gannon, AT&T Brenda Morris, Booz Allen Hamilton Benjamin Powell, WilmerHale 1 Panelist Biographies Jonathan Gannon, AT&T, Executive Director & Senior
More informationA Framework for Managing Crime and Fraud
A Framework for Managing Crime and Fraud ASIS International Asia Pacific Security Forum & Exhibition Macau, December 4, 2013 Torsten Wolf, CPP Head of Group Security Operations Agenda Introduction Economic
More informationSYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security
SYMANTEC: SECURITY ADVISORY SERVICES Symantec Security Advisory Services The World Leader in Information Security Knowledge, as the saying goes, is power. At Symantec we couldn t agree more. And when it
More informationThe Office of Infrastructure Protection
The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Protective Security Coordination Division Overview ND Safety Council Annual Conference
More informationGreg Garcia President, Garcia Cyber Partners Former Assistant Secretary for Cyber Security and Communications, U.S. Department of Homeland Security
1 Greg Garcia President, Garcia Cyber Partners Former Assistant Secretary for Cyber Security and Communications, U.S. Department of Homeland Security 2 Government Services 3 Business Education Social CYBERSPACE
More informationInformation Security Incident Response Plan
Information Security Incident Response Plan Purpose It is the objective of the university to maintain secure systems and data. In order to comply with federal, state, and local law and contractual obligations,
More informationCorporate Security & Emergency Management Summary of Submitted 2015 Budget From Rates
Corporate Security & Emergency Management Summary of Submitted 2015 From Rates Service Expense 2014 2015 Revised Non Tax Revenue Net Tax Supported Expense Draft Non Tax Revenue Net Tax Supported Increase
More informationIMPROVING NETWORK SECURITY
IMPROVING NETWORK SECURITY How AN Information Assurance Professional Assessment HELPED THE The City of Stow, Ohio is a community of just under 35,000 people, located 35 miles south of Cleveland and part
More informationSage Data Security Services Directory
Sage Data Security Services Directory PROTECTING INFORMATION ASSETS ENSURING REGULATORY COMPLIANCE FIGHTING CYBERCRIME Discover the Sage Difference Protecting your business from cyber attacks is a full-time
More informationACTIVE SHOOTER RESPONSE CAPABILITY STATEMENT. Dynamiq - Active Shooter Response
ACTIVE SHOOTER RESPONSE CAPABILITY STATEMENT ACTIVE SHOOTER RESPONSE Responding to armed assault acts of terrorism and active shooter incidents Acts of terrorism and shootings in public places have become
More informationCredit Card Data Compromise: Incident Response Plan
Credit Card Data Compromise: Incident Response Plan Purpose It is the objective of the university to maintain secure financial transactions. In order to comply with state law and contractual obligations,
More informationCYBER RESILIENCE & INCIDENT RESPONSE
CYBER RESILIENCE & INCIDENT RESPONSE www.nccgroup.trust Introduction The threat landscape has changed dramatically over the last decade. Once the biggest threats came from opportunist attacks and preventable
More informationDHS Cybersecurity. Election Infrastructure as Critical Infrastructure. June 2017
DHS Cybersecurity Election Infrastructure as Critical Infrastructure June 2017 Department of Homeland Security Safeguard the American People, Our Homeland, and Our Values Homeland Security Missions 1.
More informationVice President and Chief Information Security Officer FINRA Technology, Cyber & Information Security
Plenary Session: Cybersecurity the Current Regulatory Environment: Insight from Regulators and Industry Experts Thursday, February 22 3:45 p.m. 4:45 p.m. With recent high-profile data breaches, cybersecurity
More informationNational Policy and Guiding Principles
National Policy and Guiding Principles National Policy, Principles, and Organization This section describes the national policy that shapes the National Strategy to Secure Cyberspace and the basic framework
More informationInformation Security Incident Response Plan
Information Security Incident Response Plan Purpose It is the objective of the university to maintain secure systems and data. In order to comply with federal, state, and local law and contractual obligations,
More informationCCISO Blueprint v1. EC-Council
CCISO Blueprint v1 EC-Council Categories Topics Covered Weightage 1. Governance (Policy, Legal, & Compliance) & Risk Management 1.1 Define, implement, manage and maintain an information security governance
More informationHOTEL RESILIENT Plan ahead stay ahead. With support from the German Government through
HOTEL RESILIENT Plan ahead stay ahead With support from the German Government through WHAT CAN GO WRONG WILL GO WRONG Murphy s Law More than 40% of hotels do not reopen after large disasters FEMA 2010
More informationOffice of Infrastructure Protection Overview
Office of Infrastructure Protection Overview Harvey Perriott Protective Security Advisor North Texas District U.S. Department of Homeland Security Vision and Mission Vision A safe, secure, and resilient
More informationTSA/FTA Security and Emergency Management Action Items for Transit Agencies
TSA/FTA Security and Emergency Management Action Items for Transit Agencies AACTION ITEM LIST Management and Accountability 1. Establish Written System Security Programs and Emergency Management Plans:
More informationManaging Cyber Risk. Robert Entin Executive Vice President Chief Information Officer Vornado Realty Trust
Managing Cyber Risk Robert Entin Executive Vice President Chief Information Officer Vornado Realty Trust Adam Thomas Principal Cyber Risk Services Deloitte & Touche LLP Give Us Your Feedback for this Session!
More informationMassMutual Business Continuity Disclosure Statement
MassMutual Business Continuity Disclosure Statement Overview Resiliency is a high priority at Massachusetts Mutual Life Insurance Company ( MassMutual or the Company ). To that end, significant investments
More informationToday s cyber threat landscape is evolving at a rate that is extremely aggressive,
Preparing for a Bad Day The importance of public-private partnerships in keeping our institutions safe and secure Thomas J. Harrington Today s cyber threat landscape is evolving at a rate that is extremely
More informationMNsure Privacy Program Strategic Plan FY
MNsure Privacy Program Strategic Plan FY 2018-2019 July 2018 Table of Contents Introduction... 3 Privacy Program Mission... 4 Strategic Goals of the Privacy Office... 4 Short-Term Goals... 4 Long-Term
More informationNumber: USF System Emergency Management Responsible Office: Administrative Services
POLICY USF System USF USFSP USFSM Number: 6-010 Title: USF System Emergency Management Responsible Office: Administrative Services Date of Origin: 2-7-12 Date Last Amended: 8-24-16 (technical) Date Last
More informationICBA Summary of FFIEC Cybersecurity Assessment Tool (May 2017 Update)
ICBA Summary of FFIEC Cybersecurity Assessment Tool (May 2017 Update) June 2017 INSERT YEAR HERE Contact Information: Jeremy Dalpiaz AVP, Cyber and Data Security Policy Jeremy.Dalpiaz@icba.org ICBA Summary
More informationOverseas Security Advisory Council U.S. Department of State Diplomatic Security
Overseas Security Advisory Council U.S. Department of State Diplomatic Security Overview Part I: OSAC Background History and Structure Part II: Services RISC Staff New Initiatives Part III: Website Part
More informationCyber Security Strategy
Cyber Security Strategy Committee for Home Affairs Introduction Cyber security describes the technology, processes and safeguards that are used to protect our networks, computers, programs and data from
More informationProtecting your data. EY s approach to data privacy and information security
Protecting your data EY s approach to data privacy and information security Digital networks are a key enabler in the globalization of business. They dramatically enhance our ability to communicate, share
More informationMANUAL OF UNIVERSITY POLICIES PROCEDURES AND GUIDELINES. Applies to: faculty staff students student employees visitors contractors
Page 1 of 6 Applies to: faculty staff students student employees visitors contractors Effective Date of This Revision: June 1, 2018 Contact for More Information: HIPAA Privacy Officer Board Policy Administrative
More informationSubject: University Information Technology Resource Security Policy: OUTDATED
Policy 1-18 Rev. 2 Date: September 7, 2006 Back to Index Subject: University Information Technology Resource Security Policy: I. PURPOSE II. University Information Technology Resources are at risk from
More informationNATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium
NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium Securing Cyber Space & America s Cyber Assets: Threats, Strategies & Opportunities September 10, 2009, Crystal Gateway Marriott, Arlington,
More informationLegal, Ethical, and Professional Issues in Information Security
Legal, Ethical, and Professional Issues in Information Security Downloaded from http://www.utc.edu/center-information-securityassurance/course-listing/cpsc3600.php Minor Changes from Dr. Enis KARAARSLAN
More information79th OREGON LEGISLATIVE ASSEMBLY Regular Session. Senate Bill 90
th OREGON LEGISLATIVE ASSEMBLY-- Regular Session Senate Bill 0 Printed pursuant to Senate Interim Rule. by order of the President of the Senate in conformance with presession filing rules, indicating neither
More informationINTELLIGENCE DRIVEN GRC FOR SECURITY
INTELLIGENCE DRIVEN GRC FOR SECURITY OVERVIEW Organizations today strive to keep their business and technology infrastructure organized, controllable, and understandable, not only to have the ability to
More informationAddressing Vulnerabilities By Integrating Your Incident Response Plans. Brian Coates Enaxis Consulting
Addressing Vulnerabilities By Integrating Your Incident Response Plans Brian Coates Enaxis Consulting Contents Enaxis Introduction Presenter Bio: Brian Coates Incident Response / Incident Management in
More informationCould the BIGGEST Threat to Your Business be INSIDE Your Company?
Could the BIGGEST Threat to Your Business be INSIDE Your Company? Presented By: Cheryl W. Snead, Banneker Industries, Inc. Rick Avery, Securitas Security Inc. Cheryl W. Snead President/CEO/Facility Security
More informationTable of Contents. Sample
TABLE OF CONTENTS... 1 CHAPTER 1 INTRODUCTION... 4 1.1 GOALS AND OBJECTIVES... 5 1.2 REQUIRED REVIEW... 5 1.3 APPLICABILITY... 5 1.4 ROLES AND RESPONSIBILITIES SENIOR MANAGEMENT AND BOARD OF DIRECTORS...
More informationCyber Security Program
Cyber Security Program Cyber Security Program Goals and Objectives Goals Provide comprehensive Security Education and Awareness to the University community Build trust with the University community by
More informationDepartment of Justice Policing and Victim Services BUSINESS PLAN
Policing and Victim Services BUSINESS PLAN 2004-2005 1. The Creation of a New Division The was created in 2001 by joining the former Divisions: Policing and Public Safety Services and Victims Services.
More informationCYBERSECURITY TRAINING EXERCISE KMU TRAINING CENTER NOVEMBER 7, 2017
CYBERSECURITY TRAINING EXERCISE KMU TRAINING CENTER NOVEMBER 7, 2017 Sponsored by: Kansas Municipal Utilities Kansas Municipal Energy Agency Kansas Power Pool CYBERSECURITY TRAINING EXERCISE DATE November
More informationPD 7: Homeland Security Presidential Directive 7: Critical Infrastructure Identification, Prioritization, and Protection
PD 7: Homeland Security Presidential Directive 7: Critical Infrastructure Identification, Prioritization, and Protection December 17, 2003 SUBJECT: Critical Infrastructure Identification, Prioritization,
More informationForensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services
Forensic Technology & Discovery Services Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services Forensic Technology & Discovery Services EY s Forensic
More informationInter-American Port Security Cooperation Plan
Inter-American Port Security Cooperation Plan Thomas Morelli Program Manager for Port & Cargo Security Maritime Administration U.S. Department of Transportation Inter-American Port Security Cooperation
More informationIncident Response Services
Services Enhanced with Supervised Machine Learning and Human Intelligence Empowering clients to stay one step ahead of the adversary. Secureworks helps clients enable intelligent actions to outsmart and
More informationMaintaining Resiliency Within the Defense Industrial Base Through Preparedness Response and Recovery
Maintaining Resiliency Within the Defense Industrial Base Through Preparedness Response and Recovery Dave Komendat Chief Security Officer The Boeing Company What We Do Today Design, assemble and support
More informationThe Office of Infrastructure Protection
The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Protective Security Advisors and Special Event Domestic Incident Tracker Overview Federal
More informationTechnical Conference on Critical Infrastructure Protection Supply Chain Risk Management
Technical Conference on Critical Infrastructure Protection Supply Chain Risk Management Remarks of Marcus Sachs, Senior Vice President and the Chief Security Officer North American Electric Reliability
More informationBringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016
Bringing cyber to the Board of Directors & C-level and keeping it there Dirk Lybaert, Proximus September 9 th 2016 Dirk Lybaert Chief Group Corporate Affairs We constantly keep people connected to the
More informationBusiness Continuity Management Program Overview
Business Continuity Management Program Overview Improving the lives of our customers by connecting them to the power of the digital world CenturyLink Key Objective CenturyLink may modify or terminate this
More informationJune 5, 2018 Independence, Ohio
June 5, 2018 Independence, Ohio The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Securing the Nation at the Community Level 2018 Cuyahoga
More informationGEORGIA CYBERSECURITY WORKFORCE ACADEMY. NASCIO 2018 State IT Recognition Awards
GEORGIA CYBERSECURITY WORKFORCE ACADEMY NASCIO 2018 State IT Recognition Awards Title: Georgia Cybersecurity Workforce Academy Category: Cybersecurity State: Georgia Contact: Stanton Gatewood Stan.Gatewood@gta.ga.gov
More informationRisk Advisory Academy Training Brochure
Academy Brochure 2 Academy Brochure Cyber Security Our Cyber Security trainings are focused on building your internal capacity to leverage IT related technologies more confidently and manage risk and uncertainty
More informationM.S. IN INFORMATION ASSURANCE MAJOR: CYBERSECURITY. Graduate Program
Detroit Mercy s Master of Science in Information Assurance with a major in Cybersecurity is a multi-disciplinary 30-credit-hour graduate degree. It is designed to produce a comprehensively knowledgeable
More informationCyber Security and Cyber Fraud
Cyber Security and Cyber Fraud Remarks by Andrew Ross Director, Payments and Cyber Security Canadian Bankers Association for Senate Standing Committee on Banking, Trade, and Commerce October 26, 2017 Ottawa
More informationProfessional Training Course - Cybercrime Investigation Body of Knowledge -
Overview The expanded use of the Internet has facilitated rapid advances in communications, systems control, and information sharing. Those advances have created enormous opportunities for society, commerce
More informationOperations & Technology Seminar. Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ
Operations & Technology Seminar Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ Operations & Technology Roundtable Crowne Plaza Monroe, Monroe Township, NJ Tuesday, November 8, 2016
More informationCybersecurity. Securely enabling transformation and change
Cybersecurity Securely enabling transformation and change Contents... Cybersecurity overview Business drivers Cybersecurity strategy and roadmap Cybersecurity in practice CGI s cybersecurity offering Why
More informationCybersecurity Presidential Policy Directive Frequently Asked Questions. kpmg.com
Cybersecurity Presidential Policy Directive Frequently Asked Questions kpmg.com Introduction On February 12, 2013, the White House released the official version of the Presidential Policy Directive regarding
More informationCybersecurity Session IIA Conference 2018
www.pwc.com/me Cybersecurity Session IIA Conference 2018 Wael Fattouh Partner PwC Cybersecurity and Technology Risk PwC 2 There are only two types of companies: Those that have been hacked, and those that
More informationGlobal Security Operation Center GSOC
Global Security Operation Center GSOC Best of Breed Opinion Basic requirements for a best in class Global Security Operation Center. CONSULTING AND INVESTIGATIONS DIVISION The Consulting and Investigations
More informationNATIONAL CAPITAL REGION HOMELAND SECURITY STRATEGIC PLAN SEPTEMBER 2010 WASHINGTON, DC
NATIONAL CAPITAL REGION HOMELAND SECURITY STRATEGIC PLAN SEPTEMBER 2010 WASHINGTON, DC Draft Version incorporating Management Review [MR] Edits and Comments Document Date: July 2013 Goal One: Ensure Interoperable
More informationRailroad Infrastructure Security
TRB Annual Meeting January 14, 2002 Session 107 - Railroad Security William C. Thompson william.thompson@jacobs.com 402-697-5011 Thanks to: Bob Ulrich Dr. William Harris Byron Ratcliff Frank Thigpen John
More informationSection One of the Order: The Cybersecurity of Federal Networks.
Summary and Analysis of the May 11, 2017 Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure. Introduction On May 11, 2017, President Donald
More informationSteps to Take Now to be Ready if Your Organization is Breached Thursday, February 22 2:30 p.m. 3:30 p.m.
Steps to Take Now to be Ready if Your Organization is Breached Thursday, February 22 2:30 p.m. 3:30 p.m. The cyber threats are no longer a question of if, but when, a breach will occur. It is important
More informationDecember 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development
December 10, 2014 Statement of the Securities Industry and Financial Markets Association Senate Committee on Banking, Housing, and Urban Development Hearing Entitled Cybersecurity: Enhancing Coordination
More informationNational Counterterrorism Center
National Counterterrorism Center Vision To become the nation s center of excellence for terrorism and counterterrorism issues, orchestrating and shaping the national and international effort to eliminate
More informationCYBER INSURANCE: MANAGING THE RISK
CYBER INSURANCE: MANAGING THE RISK LEON FOUCHE PARTNER & NATIONAL CYBERSECURITY LEAD BDO AUSTRALIA MEMBER OF THE GLOBAL CYBERSECURITY LEADERSHIP GROUP ii CYBER INSURANCE: MANAGING THE RISK There s no doubt
More informationIncentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO
White Paper Incentives for IoT Security May 2018 Author: Dr. Cédric LEVY-BENCHETON, CEO Table of Content Defining the IoT 5 Insecurity by design... 5 But why are IoT systems so vulnerable?... 5 Integrating
More informationPREPARED STATEMENT OF ERNEST R. FRAZIER, SR., ESQ. AMTRAK, CHIEF OF POLICE AND SECURITY DEPARTMENT
PREPARED STATEMENT OF ERNEST R. FRAZIER, SR., ESQ. AMTRAK, CHIEF OF POLICE AND SECURITY DEPARTMENT HOUSE TRANSPORTATION & INFRASTRUCTURE SUBCOMMITTEE ON RAILROADS Oversight Hearing on Railroad Security
More informationMember of the County or municipal emergency management organization
EMERGENCY OPERATIONS PLAN SUUPPORT ANNEX B PRIVATE-SECTOR COORDINATION Coordinating Agency: Cooperating Agencies: Chatham Emergency Management Agency All Introduction Purpose This annex describes the policies,
More informationService. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution
Service SM Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution Product Protecting sensitive data is critical to being
More informationCybersecurity and Hospitals: A Board Perspective
Cybersecurity and Hospitals: A Board Perspective Cybersecurity is an important issue for both the public and private sector. At a time when so many of our activities depend on information systems and technology,
More informationIntroduction to Business Continuity Management
Introduction to Business Continuity Management Audio Presented by ABD s Occupational Health and Safety Team Featuring The Cross Connection JULY 24, 2018 Speaker Panel ABD Insurance & Financial Services
More informationGlobal Risks Peculiar to Resorts: Richard G. Hudak Managing Partner Resort Security Consulting Inc.
Global Risks Peculiar to Resorts: Prevention, Management, Litigation Richard G. Hudak Managing Partner Resort Security Consulting Inc. www.resortsecurity.com Presenters Richard G. Hudak, Managing Partner,
More informationISACA MOSCOW CHAPTER Chapter meeting 22 September 2016
ISACA MOSCOW CHAPTER Chapter meeting 22 September 2016 Introduction Special guest speaker ISACA Audit committee member, Rosemary Amato Open dialog Wrap-up and close Special guest speaker CISA, CMA, CPA,
More informationThe Office of Infrastructure Protection
The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Organisation for the Prohibition of Chemical Weapons September 13, 2011 Overall Landscape
More informationUNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21
National and Cyber Security Branch Presentation for Gridseccon Quebec City, October 18-21 1 Public Safety Canada Departmental Structure 2 National and Cyber Security Branch National and Cyber Security
More informationA Checklist for Compliance in the Cloud 1. A Checklist for Compliance in the Cloud
A Checklist for Compliance in the Cloud 1 A Checklist for Compliance in the Cloud A Checklist for Compliance in the Cloud 1 With the industrialization of hacking and the enormous impact of security breaches,
More informationThe challenges of the NIS directive from the viewpoint of the Vienna Hospital Association
The challenges of the NIS directive from the viewpoint of the Vienna Hospital Association page 1 Cybersecurity Strategy Essential Points The norms, principles and values that the City of Vienna and the
More information